-
61
Uniform Treatment of Jensen’s Inequality by Montgomery Identity
Published 2021-01-01“…Also, we give applications in information theory for our obtained results, especially for Zipf and Hybrid Zipf–Mandelbrot entropies.…”
Get full text
Article -
62
Dynamic trust model based on recommendation chain classification in complex network environment
Published 2015-09-01“…According to the recommendation information processing problem in complex network environment,a trust model based on the recommendation chain classification was proposed.The classification method was based on honesty attribute of nodes,which could choose an effective recommendation chain on the basis of practical experience data.The recommendation information dissemination parameters were based on the information gain,which made recommendation information be more accurate.The factor of time was also considered in this model.The ability of interaction and the one of honesty were distinguished clearly.The concept of information entropy in information theory was used in the final ag-gregation calculation of direct trust and recommendation trust,which could get rid of the ambiguity of the previous sub-jective parameter settings.The main polymerization parameters could be continuously corrected with the interactions in order to achieve the situation being closest to the reality.Simulation results show the validity of recommendation chain classification and the rationality of the parameter settings in the proposed model.…”
Get full text
Article -
63
Horizon causality from holographic scattering in asymptotically dS3
Published 2024-12-01“…This statement is formalized by the connected wedge theorem, which can be proven using general relativity within AdS3 but also argued for using quantum information theory on the boundary, suggesting that the theorem applies to any holographic duality. …”
Get full text
Article -
64
Comparative Study of Generalized Quantitative-Qualitative Inaccuracy Fuzzy Measures for Noiseless Coding Theorem and 1:1 Codes
Published 2015-01-01“…The study of codes is introduced in Information Theory, electrical engineering, mathematics, and computer sciences for the transmission of data through reliable and efficient methods. …”
Get full text
Article -
65
Human breathing perception system based on Wi-Fi subcarrier mutual information
Published 2024-02-01“…The unpredictable environmental changes cause large fluctuations in Wi-Fi signals, and it is difficult to quantify the static and behaviorally-aware dynamic components in the subcarriers, so it is not possible to accurately portray the fluctuating form of dynamic breathing characteristics.Based on this, a subcarrier mutual information breathing perception (SMIBP) system was proposed.Firstly, a form of inscribing dynamic component information (DCI) was proposed, and mutual information theory was utilized to extract the dynamic component information representing respiration in subcarriers.Then, analytic hierarchy process (AHP) was used to combine the subcarriers to maximize the dynamic characteristics of the respiratory signals to obtain the reconstructed DCI sensory base signals.Finally, the respiration rate was obtained by combining the wavelet transform and peak detection method, which revealed of a theoretical pathway representing the dynamic component of human respiration.Simulation results show that the proposed system can better characterize the dynamic breathing component in each subcarrier, and can significantly improve the sensing accuracy and range of Wi-Fi for small-scale actions in different scenarios.…”
Get full text
Article -
66
Higgs Information and NMSSM at the Large Hadron Collider
Published 2024-01-01“…Information theory has proven to be a worthwhile tool for investigating the implications of the Higgs sector in the Next-to-Minimal Supersymmetric Standard Model (NMSSM) using Higgs information at the Large Hadron Collider (LHC) assessed through the entropy constructed by means of the branching ratios of decay channels of the Higgs boson. …”
Get full text
Article -
67
A Comparison between Theoretical and Experimental Measures of Consciousness as Integrated Information in an Anatomically Based Network of Coupled Oscillators
Published 2018-01-01“…The Integrated Information Theory (IIT) is one of the best mathematical rooted attempts to quantify the level of consciousness in a system with Φ as the effective information generated in a system above its parts. …”
Get full text
Article -
68
Generalized Exponential Fuzzy Entropy Approach for Automatic Segmentation of Chest CT with COVID-19 Infection
Published 2022-01-01“…To address this challenge, we propose a novel framework involving an optimization technique algorithm to solve a multilevel thresholding problem based on information theory to segment abnormal lung CT scans. The proposed framework will evaluate a sample of CT scan images taken from a well-known benchmark database. …”
Get full text
Article -
69
Information-theoretic bounds for accuracy of letter encoding and pattern recognition via ensembles of datasets M.M. Lange 1, A.M. Lange 1
Published 2024-06-01“…Moreover, the obtained functions are similar to the rate distortion function known in the information theory.…”
Get full text
Article -
70
Adaptive message sending rate control method based on channel congestion cost calculation in VANET
Published 2016-10-01“…In VANET,sending beacon messages reliably played a vital role in cooperative awareness and collision avoidance,and changes of vehicle density in real traffic environment had a direct impact on channel load and will cause the channel congestion to a certain degree,thus causing inefficiency of cooperative security applications.Aiming at this issue,a adaptive method based on channel congestion detection to control message sending rate was designed.First of all,an interference model that can accurately reflect the current state of the channel was established.Secondly,according to the Shannon information theory and network utility maximization theory,the optimal transmission speed of the current node in the physical layer was calculated.Finally,according to the mismatch of transmission rate and transmission queue length,the next moment's cost function of the channel congestion degree by monitoring the message queue was established to avoid channel congestion and queue overflow.The simulation experiment shows that the scheme effectively reduces communication transmission delay and avoids channel congestion,ensuring that the data be sent reliably.…”
Get full text
Article -
71
A survey on deep learning based joint source-channel coding
Published 2020-10-01“…Classical information theory shows that separate source-channel coding is asymptotically optimal over a point-to-point channel.As modern communication systems are becoming more sensitive to delays and bandwidth,it becomes difficult to adopt the assumption that such separate designs have unlimited computing power for encoding and decoding.Compared to joint source-channel coding,separate coding has proven to be sub-optimal when the bandwidth is limited.However,conventional joint source-channel coding schemes require complicated design.In contrast,data-driven deep learning brings new designing ideas into the paradigm.A summary of relevant research results was provided,which will help to clarify the way in which deep learning methods solve the joint source-channel coding problem and to provide an overviewof new research directions.Source compression schemes and end-to-end communication system models were firstly introduced,both based on deep learning,then two kinds of joint coding designs under different types of source,and potential problems of joint source-channel coding based on deep learning and possible future research directions were introduced.…”
Get full text
Article -
72
Low Complexity, Low Probability Patterns and Consequences for Algorithmic Probability Applications
Published 2023-01-01“…By considering the information content of different output patterns, recent work invoking algorithmic information theory inspired arguments has shown that a priori probability predictions based on pattern complexities can be made in a broad class of input-output maps. …”
Get full text
Article -
73
A theoretical framework for the concept of ‘Internet strategy'
Published 2022-10-01“…‘Internet strategy’ is conceptualised based on the following theories: information theory, the communication process, mass communication theory, strategic management theory, corporate communication roles theory, and the models for developing corporate communication strategy and communication plans. …”
Get full text
Article -
74
Improved DFA algorithm based on multi-dimensional finite automata
Published 2015-05-01“…Compiling multiple regular expression signatures into a combined DFA can blowup in state and storage space.Explanations from the prospective of information theory and multi-dimensional mathematical model were proposed fo-cusing on the most serious state explosion.Redundancy states were divided into zero-dimensional ones and one-dimensional ones.The former were compressed by dimension,and the later were dynamically built.The space com-plexity of the model came to the theoretical lower bound by the above methods.Then the multi-dimensional finite auto-mata (MFA) was proposed with the model.Experiments show that,the construction time taken by MFA is slightly less than XFA and is 2~3 orders of magnitude lower than DFA,STT redundancy compression algorithms and Hybrid-FA; the memory space of MFA is slightly higher than XFA,but is 1~2 orders of magnitude lower than DFA,STT redundancy compression algorithms,mDFA and Hybrid-FA; in the aspect of matching time,MFA ranks after DFA and Hybrid-FA,but ranks before XFA,and it achieves 1~2 orders of magnitude lower than that of STT redundancy compression algo-rithms and mDFA.…”
Get full text
Article -
75
Research on Behavior Monitoring of Elderly Living Alone Based on Wearable Devices and Sensing Technology
Published 2021-01-01“…This method subdivides behavior perception into behavior recognition and status monitoring, determines the optimal sensor combination for identifying monitoring different behaviors based on information theory, and then uses a behavior recognition model modeled by a multiclassifier and a status model modeled by a plurality of two classifiers that are used to perceive user behavior. …”
Get full text
Article -
76
Green banking disclosure: A bibliometric analysis
Published 2024-07-01“…The analysis results of the other criteria show that institutional theory, asymmetry information theory, and content analysis were used to study green banking disclosure, which is related to corporate social responsibility and sustainability. …”
Get full text
Article -
77
Security of differential phase shift QKD from relativistic principles
Published 2025-01-01“…The proof combines techniques from quantum information theory, quantum optics, and relativity. We first give a security proof of a QKD protocol whose security stems from relativistic constraints. …”
Get full text
Article -
78
POST-KEYNESIANISM: EVOLUTION OF KEYNESIAN MACROECONOMICS IN THE 20TH CENTURY
Published 2016-12-01“…There are considered the basic directions of development of post-Keynesianism such as Neo-Ricardian theory of value and prices of goods based on direct costs of production in the framework of macroeconomic model by P. Sraffa, information theory of "fundamental" uncertainty of the future by R. …”
Get full text
Article -
79
Quantifying Contributions of External Drivers to the Global Ionospheric State
Published 2021-09-01“…Abstract To advance our understanding of the global response of the ionospheric total electron content (TEC) to various external drivers, we apply entropy‐based information theory to quantify contributions of solar, interplanetary, and lower atmospheric drivers to the global ionospheric state described by the Global Ionospheric Map (GIM). …”
Get full text
Article -
80
On Computation and Analysis of Topological Index-Based Invariants for Complex Coronoid Systems
Published 2021-01-01“…Explicitly, this tremendous improvement has been outstanding in the field of soft computing, molecular biology, and information technology. The information theory, delineated by Claud Shannon, has no less importance when it was considered. …”
Get full text
Article